Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-based Expert Systems, and . (0000)Soft Computing Paradigms for Web Access Pattern Analysis., , and . Classification and Clustering for Knowledge Discovery, volume 4 of Studies in Computational Intelligence, Springer, (2005)Artificial immune system inspired behavior-based anti-spam filter., , , , and . Soft Comput., 11 (8): 729-740 (2007)Web Traffic Mining Using a Concurrent Neuro-Fuzzy Approach., , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 853-862. IOS Press, (2002)Global Optimisation of Neural Networks Using a Deterministic Hybrid Approach., and . HIS, page 79-92. Physica-Verlag, (2001)Adaptive Database Learning in Decision Support Systems Using Evolutionary Fuzzy Systems: A Generic Framework., , and . HIS, page 237-251. Physica-Verlag, (2001)Soft Computing for Developing Short Term Load Forecasting Models in Czech Republic., , and . HIS, page 207-221. Physica-Verlag, (2001)Optimizing Linear Prgramming Technique Using Fuzzy Logic., and . HIS, page 269-283. Physica-Verlag, (2001)D-SCIDS: Distributed soft computing intrusion detection system, , , and . Journal of Network and Computer Applications, 30 (1): 81--98 (January 2007)Evolving Intrusion Detection Systems, and . Genetic Systems Programming: Theory and Experiences, volume 13 of Studies in Computational Intelligence, Springer, Germany, Forthcoming.(2006)